Principles and practice of information theory
Principles and practice of information theory
An introduction to signal detection and estimation (2nd ed.)
An introduction to signal detection and estimation (2nd ed.)
Handbook of Applied Cryptography
Handbook of Applied Cryptography
An Information-Theoretic Approach to Steganography and Watermarking
IH '99 Proceedings of the Third International Workshop on Information Hiding
Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
On the invertibility of invisible watermarking techniques
ICIP '97 Proceedings of the 1997 International Conference on Image Processing (ICIP '97) 3-Volume Set-Volume 1 - Volume 1
A general framework for robust watermarking security
Signal Processing - Special section: Security of data hiding technologies
Dependence, correlation and Gaussianity in independent component analysis
The Journal of Machine Learning Research
Information-theoretic analysis of security in side-informed data hiding
IH'05 Proceedings of the 7th international conference on Information Hiding
Fundamentals of data hiding security and their application to spread-spectrum analysis
IH'05 Proceedings of the 7th international conference on Information Hiding
Anti-collusion fingerprinting for multimedia
IEEE Transactions on Signal Processing
The zero-rate spread-spectrum watermarking game
IEEE Transactions on Signal Processing
Security pitfalls of frame-by-frame approaches to video watermarking
IEEE Transactions on Signal Processing - Part II
On the limits of steganography
IEEE Journal on Selected Areas in Communications
IEEE Journal on Selected Areas in Communications
Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
IEEE Transactions on Image Processing
Secret and public key image watermarking schemes for image authentication and ownership verification
IEEE Transactions on Image Processing
Applying informed coding and embedding to design a robust high-capacity watermark
IEEE Transactions on Image Processing
Analysis of a zero location based authentication scheme for biomedical images
Proceedings of the 1st international conference on Forensic applications and techniques in telecommunications, information, and multimedia and workshop
A Bootstrap Attack on Digital Watermarks in the Frequency Domain
ICICS '08 Proceedings of the 10th International Conference on Information and Communications Security
Transactions on data hiding and multimedia security III
Worst-case optimal fingerprinting codes for non-threshold collusion
DRMTICS'05 Proceedings of the First international conference on Digital Rights Management: technologies, Issues, Challenges and Systems
Watermarking security: a survey
Transactions on Data Hiding and Multimedia Security I
High payload data-hiding in audio signals based on a modified OFDM approach
Expert Systems with Applications: An International Journal
Hi-index | 0.00 |
Digital watermarking studies have always been driven by the improvement of robustness. Most of articles of this field deal with this criterion, presenting more and more impressive experimental assessments. Some key events in this quest are the use of spread spectrum, the invention of resynchronization schemes, the discovery of side information channel, and the formulation of the opponent actions as a game. On the contrary, security received little attention in the watermarking community. This paper presents a comprehensive overview of this recent topic. We list the typical applications which requires a secure watermarking technique. For each context, a threat analysis is purposed. This presentation allows us to illustrate all the certainties the community has on the subject, browsing all key papers. The end of the paper is devoted to what remains not clear, intuitions and future studies.